Analysis

  • max time kernel
    129s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2024, 13:53

General

  • Target

    10ae55ef25b3f59750091a17ba54f635_JaffaCakes118.html

  • Size

    158KB

  • MD5

    10ae55ef25b3f59750091a17ba54f635

  • SHA1

    c9a120f57d4d326492b4251e5cf5f13f5515a2ac

  • SHA256

    73f65abe3c9deab8aca14166e7b2693d1d76cba23a6e467e11722d582b970a55

  • SHA512

    a9d3589b31c719f6bde06935a358badc9a4c4fba29c6a2ac0b8adcc2f1bd50848f918ceed3791e485c451c003686b617f3dcd0d86925327ad0798062e146200b

  • SSDEEP

    1536:iIRTr+qj8KXClRQfxndO+wofwwOZdIuTXS7nlU8XHKPNue/54Dwmkh3BUFcZ6Cfz:iCo8wWtyfkMY+BES09JXAnyrZalI+YQ

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\10ae55ef25b3f59750091a17ba54f635_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:896
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1536
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2096
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:472071 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2924

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d328b653d4dc53ecc053e1bb6e798665

      SHA1

      b30f5f29cfb400896d773e01f2cd37965aa5c21b

      SHA256

      93be446425a0de7c40bcc63193a60164f96bc7871452c38113461f13f99d6386

      SHA512

      3e68cc8c5d7c003e7332876e98066f9cf927d4439017a236895c44c6c3035a974bead431ad4979fad4b3b6d4164b649fd53279938cccb6249c78c522b5e90d45

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1d2820909ef741e3667627691fb75a47

      SHA1

      88395b13d045c2315075be9dce593c5df956da28

      SHA256

      82f0aad452e4f9765069f0799cc300d674788591bc0e1c15757702ef88c17875

      SHA512

      8400bf55a600adc7b822ce6969a91bd51b0891ddecce67e67bb4a617b4445a6dc8f3949a92142ce81585d5dd6fcc4f29ede5953f894e3389d508333ef057cd7e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a1bcfb3eec9b6bed8c847203102cc0e5

      SHA1

      a493795a593dcd9881eaf114e731a9936de443c0

      SHA256

      1d6b0226b07aedf6d1dd844a6cf929a19681edcb19274c51d9f2713bcf20526d

      SHA512

      8d928874448e175c8fdace1140d1a48c363eaf3b4a79f7b1e5ae6e22e3304fc911ddcd9f78d99a8aa4ec7fa05c63c4a96b18c64be7179b3cf33c8197d63762f9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      48711639feb2b72a961b7d03392be9f2

      SHA1

      61fbf83e94cf11166a4281c37044ffaeceda4d32

      SHA256

      e5fb9ab7d0c6b43f7c59b670f753d2ec58da1364ce2cd8cf72332f516a398ba5

      SHA512

      701119ed32a9becb4171128263d5b121fc2815b49cbe01d02a12a5a799fa79bd4ef83545840889719f8bba5c281535cd8b9e9fb5fe7a19274c0b9759b30f3e67

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3a4915102e9bffd6ba59fe8ddd3f7017

      SHA1

      90e905035f9fd8cf1de367afa98042e23202df30

      SHA256

      444c821153ab29a423f02903e14999b6dd57c1cd65a349a541fa70da66efe4e1

      SHA512

      73a578017741d6b31e97c1d4995dc5444e3c3c4ad0a00cd18f73efb0ad8f189489e0070770053cf05fcec59d0f928e165bcb020e5eebcc3dcb6f91e65b73cb76

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0c8e2b46de9caad5b54c88916c52fb3e

      SHA1

      69cb664ab115bf479771c353ab389945ffca7625

      SHA256

      310c43ee0ff82f66ccfbb0aa8f3297324698ce8e07d3bd3fbe253a81bf6200d9

      SHA512

      69a4c72b4343b1e95a0e91dea7cdda8017b126f75df89c87fcfcb486b69d0f46827778c2e551f190f13f311b9257a638d9e273bd46b8da8e9d464bd918197b96

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f8b056fc969c2a2327dfa8e8498ed4ee

      SHA1

      9aa4e8577b1e4a5e9a10899c66bdb6e45b7fc7ec

      SHA256

      6993127f236c6d6a17d3fb42e048e8da20aa6d81295b30e5444f14ea14b8e9f9

      SHA512

      c3d189017ce87cadcf4edb6da1adaebfee9020b7095d656227bbdd56c6c3ae426c04c2b7425cea6fa9d7572cc3e731ce735e58e981571c52bc971c8c86038cc9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      816850111b2e0b9107a8466903537422

      SHA1

      5a050753c3c513e90bc2546c7c3571303f48f4ea

      SHA256

      e67e9d95f9d50b4a6b7af291f7ca75faceb75a8baec639e5172bc8129906c071

      SHA512

      c8d8a8a31ef1b736d7d0bfb3b23be9f1d020fdbce536a00c1e62a2852161fbdae37bc08f3330c87025910aad3be8726ba842edcce9fccdac840f157e83d52aa4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5f5b9a3ca030f6b3f512befaa7b0cbeb

      SHA1

      402bdc1f36e2c49670771b349836c6dcb5c02a86

      SHA256

      85a09bb093b3f7791fd0554d9f7f0016a51a2db621617344d307ea709abd3755

      SHA512

      aac4ce535059028d919ff5d2496f3d9e5c6165cac1edb3420123c4086154859d992924c99d6f0b590763793ad5a76d6f1fc734908b37ca8effe1d47919f06f61

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      879c803cbfd05f8dfafd90d858d90548

      SHA1

      8da9a9dbd4b050df9b624edc11267e26939999a1

      SHA256

      ddb06fa87bb61453587d3854d7457f292e8e72b60430294f239e249b944a1504

      SHA512

      95621819fdbe7dc60c515bed36d526777b6d7e2c65f88eccc23a4d1778b7cb078e81885c577c4b4a100d348312609b58a935c622b1b9f39526e9c25c5f7033c4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d900b202a1427e6e878519fb17b37d5a

      SHA1

      3a4891f49750834ce82965935f78bce032c4c18e

      SHA256

      9cd94e86934defa275283f5bd98d1c0512fc882b1512877f279794714ab536d2

      SHA512

      617a8c3da8102494b6ab724bb6db425605052512ae06f9fdf6e7d8d2769d381770090370956cef7f2b993a9517f9efbc9e2b8a95ee888a190e7fb7456e62f51e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      fd814e506529c2da4dec4fb0820d641c

      SHA1

      a99f4bc6f3021054214b370e8b1761426c60dc57

      SHA256

      5eb89017adbef60964dd464736e2957b9b10be0b953e932da4ec7ae645cb182b

      SHA512

      5214063e1d1b07d96dd08a0b596e0bb63b1f1837dafe26b5610db84d5f3d360e55c68f9da3ea453b9f17338af51f9884d8eae5aa4d48c3401e421d1563555f7a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      df19f9c90f7d0d949fc4cf5e0025113e

      SHA1

      29c900e3595ea745d905f1f1e67e6f9a6474151d

      SHA256

      c49b7a326b7308ebdc294e160bb669d4745b8c20a9b73db443988d09cd5e529f

      SHA512

      de4410428704a0946358346ae3b40d523c19c37f6ea6e5bdf1db9e3ec0c15c12d32300277c0ca8c92f3c9d153cee70e4fa4f456d4f272a08972a0be3c404f30a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1f3491deb0a3318a55874ad7c503ac9c

      SHA1

      298715796b210100fcc5cea298636bcb6a1323e1

      SHA256

      ccbd4d7ab8435c9b43a0d270c3b2ae1907641d48af84c7c9473de6b26041b738

      SHA512

      e8ef656777a1d5cd593fff8ca76a3bc97a8fba10db25ac18cd596dacc2433ff268c9766efca1adb1133c7e65b4f6c9c56dd50d1cf7fd4b9b29cacf23f2bb7957

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      6c8f5f210aa705f8fc2dab6182474d63

      SHA1

      474b1124225540b64b6afa7e6ff94c086829e363

      SHA256

      506bc32621d6b465ea9c2b7de645f95d736e20f43470b7b34f348b3b6b5ab168

      SHA512

      8573888ffebdc16c83216800482facb499d010a9ab57cbb54f31dbdee5755e465333c8c84f909e620f4f4a50f12a442ac86c50099e3077014277903d0388da92

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5ac4ced60cda57e4e3e14750d62d04a2

      SHA1

      43635f89b6c60a88a13e877fd735f5392d4f2216

      SHA256

      abb045e776ebea91990a95283040444901d9739a0bd45aa02b3830fcebcb233e

      SHA512

      ec81965ff4e63e4d9d21eb64f6f69ede5f1fcc8e2792d60aaeb117dbb37293adc91f938f07510cac48d8fe62ba8c7c0ae079629b649dc471d0455cf1977d140f

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      d1be6271bb79d237cf5d94ba76444171

      SHA1

      ba10fb4d457a0d9a37c514aea319142c62828066

      SHA256

      3d5ea4d04181a46185059514e6147285969a638d6eb7a009dd7b87143b1152f0

      SHA512

      0151eacfa8cc9d109a1b08afdcfaae2c39a3cd2fd1c7de3bc5b84557bed6024532da91f575fc9fa28846a9bcba78c19075a1acfa410150d8f37e9ee63f7f15fa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5eddbb54229dbea0962848c33cc6fb00

      SHA1

      eb93557265fa33121b088dae116460b9729ef810

      SHA256

      97a8d7888ea5da42ba7238586c61234700dbced4d01d08f1e3b40a59b092ea7d

      SHA512

      71a0a95fb3af1d1acbd14b452243ead55c768809b9dfeafd7823c1a380332ca86013494530f66c1b6ec853d390e6038497d863fd63b7e17dafa2029db5898344

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bd72d2b29b0c7d8c5f8d5004ff844632

      SHA1

      0b323a468d0170e9979ae60ef29dba753dbeb747

      SHA256

      5167027bcfdbab0ec9edb85fd3fc5cd20708bb325e0fe8d4b44ee825be38a5e5

      SHA512

      208d1573185e16f88e88f046fcfe53a10905773e1f72b3465ecb2292db47c5d7013a8254c3485eef2f348f40ed3f73f12abc67010a203e00a55c11446205bfdd

    • C:\Users\Admin\AppData\Local\Temp\Cab1344.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar1416.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • \Users\Admin\AppData\Local\Temp\svchost.exe

      Filesize

      55KB

      MD5

      ff5e1f27193ce51eec318714ef038bef

      SHA1

      b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

      SHA256

      fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

      SHA512

      c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

    • memory/896-483-0x0000000000230000-0x000000000023F000-memory.dmp

      Filesize

      60KB

    • memory/896-482-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1536-493-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1536-491-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/1536-489-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB